Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 01:21
Static task
static1
Behavioral task
behavioral1
Sample
doc01312820220921192503.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
doc01312820220921192503.pdf.exe
Resource
win10v2004-20250129-en
General
-
Target
doc01312820220921192503.pdf.exe
-
Size
1.5MB
-
MD5
0566ce9fc8b9fadc1520c1c405c506c0
-
SHA1
69f313abba1959e57d99a690cdebbdc5e7006885
-
SHA256
46837b2b83edea93a312915b020a2aad926e18fcee577c8442853ebb8fabea13
-
SHA512
e1c3074866f9d257d077406f5ccca42f0752ce5235a3fe300977ddecfcdfe042b83238d6da22f79be643c27939e8a5857afc7d4ecaa141a8e7231df614e13d20
-
SSDEEP
24576:BAOcZuOEliE5L0ZKfCiFePXVSee+cvn7eaGAuvZG31RMaas/xG4ihMhi9+zOgQVC:bpihpigPFmJvn7tQA3XM9nxsi9LPT4
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5310184325:AAFI3fSQ6VcGu_NSTmv7d-qK2WCVhYY_qfg/sendMessage?chat_id=1293496579
Extracted
agenttesla
https://api.telegram.org/bot5422204482:AAEu-I3AZCMcCehYPkAHAbI6qEwhd1OKxpk/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Blustealer family
-
Executes dropped EXE 3 IoCs
pid Process 2292 DL NETIVE BOTNET LOGS.exe 1956 kafxmchc.pif 2372 RegSvcs.exe -
Loads dropped DLL 10 IoCs
pid Process 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 2316 doc01312820220921192503.pdf.exe 1956 kafxmchc.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\8_77\\kafxmchc.pif C:\\Users\\Admin\\8_77\\vqoa.dio" kafxmchc.pif -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2292 set thread context of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 1956 set thread context of 2372 1956 kafxmchc.pif 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DL NETIVE BOTNET LOGS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kafxmchc.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doc01312820220921192503.pdf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2372 RegSvcs.exe 2372 RegSvcs.exe 2372 RegSvcs.exe 2372 RegSvcs.exe 2372 RegSvcs.exe 2372 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 DL NETIVE BOTNET LOGS.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2292 2316 doc01312820220921192503.pdf.exe 31 PID 2316 wrote to memory of 2292 2316 doc01312820220921192503.pdf.exe 31 PID 2316 wrote to memory of 2292 2316 doc01312820220921192503.pdf.exe 31 PID 2316 wrote to memory of 2292 2316 doc01312820220921192503.pdf.exe 31 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2316 wrote to memory of 1956 2316 doc01312820220921192503.pdf.exe 32 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 2292 wrote to memory of 1968 2292 DL NETIVE BOTNET LOGS.exe 33 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 PID 1956 wrote to memory of 2372 1956 kafxmchc.pif 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc01312820220921192503.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc01312820220921192503.pdf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\8_77\DL NETIVE BOTNET LOGS.exe"C:\Users\Admin\8_77\DL NETIVE BOTNET LOGS.exe" Community portal – Bulletin board,2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
PID:1968
-
-
-
C:\Users\Admin\8_77\kafxmchc.pif"C:\Users\Admin\8_77\kafxmchc.pif" vqoa.dio2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD56d0effa3c91e7dab9770d542f1e13bd3
SHA1d58c60b7fc51defbfeae317125c68ff9e7ef143d
SHA256d8a82dab51ae0726e48d79efb85c1faa978db0969eeee5f1129e338fadb7cfcc
SHA5121adeb5b30dac33a7c771adfe4cbde461f8d699ad844a7432a6be463f70f4b5f9aaf0becaf28d5a8f409944c3314eeee504108dbcee2b43cec84cd8bd375a82e4
-
Filesize
56KB
MD577ae283c682140c74eb5d49dd9d26077
SHA192242f79f6cdee7ce7d3aa74e4aaea35a5fd9a6e
SHA2567277589980844745740ec546a3608225a33a7e40afd53a302a2984c4ee632d65
SHA512d3c79bc1f66df206d6655de581a84f935e700554ec5dc4191c5a9550dc57754068adf94853e795adfa6b023185f5751b1877b413ff32711b60275966f6bebb0f
-
Filesize
440KB
MD561f35c53811bb66d62effc5a53de458f
SHA1e4507c6a3d5c3d01f19c487366044febb126ca70
SHA256833be5c7dccf68c26164d893636d27cc0ee9f870c472ca52aa90e33477c66eb1
SHA5125148a115d3665bb951d537231c8262af5bbffbbaa7a7f2110623a95cf935cd8a6b13e77f62a712f44b871ca3b4182f13d0fcd3ed26e8cd00657c31d043044384
-
Filesize
794KB
MD518e404787e9c044105f5c4bec4600bd8
SHA19f1015bd7f33a6f3c1cc12c0971f51b1adee1939
SHA256e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12
SHA512c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215